Dónal McCarthy, P. Malone, Johannes Hange, Kenny Doyle, Eric Robson, Dylan Conway, S. Ivanov, Lukasz Radziwonowicz, Robert Kleinfeld, T. Michalareas, T. Kastrinogiannis, Nikos Stasinos, Fenareti Lampathaki
{"title":"Personal Cloudlets: Implementing a User-centric Datastore with Privacy Aware Access Control for Cloud-Based Data Platforms","authors":"Dónal McCarthy, P. Malone, Johannes Hange, Kenny Doyle, Eric Robson, Dylan Conway, S. Ivanov, Lukasz Radziwonowicz, Robert Kleinfeld, T. Michalareas, T. Kastrinogiannis, Nikos Stasinos, Fenareti Lampathaki","doi":"10.1007/978-3-319-25360-2_3","DOIUrl":"https://doi.org/10.1007/978-3-319-25360-2_3","url":null,"abstract":"","PeriodicalId":159844,"journal":{"name":"2015 IEEE/ACM 1st International Workshop on TEchnical and LEgal aspects of data pRivacy and SEcurity","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134174555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Sgandurra, Francesco Di Cerbo, S. Trabelsi, F. Martinelli, Emil C. Lupu
{"title":"Sharing Data through Confidential Clouds: An Architectural Perspective","authors":"D. Sgandurra, Francesco Di Cerbo, S. Trabelsi, F. Martinelli, Emil C. Lupu","doi":"10.1109/TELERISE.2015.19","DOIUrl":"https://doi.org/10.1109/TELERISE.2015.19","url":null,"abstract":"Cloud and mobile are two major computing paradigms that are rapidly converging. However, these models still lack a way to manage the dissemination and control of personal and business-related data. To this end, we propose a framework to control the sharing, dissemination and usage of data based on mutually agreed Data Sharing Agreements (DSAs). These agreements are enforced uniformly, and end-to-end, both on Cloud and mobile platforms, and may reflect legal, contractual or user-defined preferences. We introduce an abstraction layer that makes available the enforcement functionality across different types of nodes whilst hiding the distribution of components and platform specifics. We also discuss a set of different types of nodes that may run such a layer.","PeriodicalId":159844,"journal":{"name":"2015 IEEE/ACM 1st International Workshop on TEchnical and LEgal aspects of data pRivacy and SEcurity","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126880421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}